1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
7

Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is

visible to all of them but no other person other than the pair should be able to decode their communication. How many public and private keys are required for this group?
Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
5 0

Answer:

The answer is "64"

Explanation:

There has been 1 Private Key 1 Public Key for every person. The private key is used for other app messages. All else uses the Public Key to encrypt messages with that user. Those keys are numerically related. Even if you have 5 users, you will be given 5 Personal keys and 5 Public keys.

  • All user will have a duplicate of other public keys, which indicates (n*n-1) copies of n public keys on different systems to make sure shared contact between all users, plus n private keys.
  • The unique key count is 2n, with n^2 distributed private and public keys on different systems.
  • 8 people,  where 8 is a number, that is equal to n so, n^2 = 8^2 =8 \times 8 = 64
You might be interested in
What is the key function of a Scrum Master?
Reptile [31]

Answer:

The scrum master is the team role responsible for ensuring the team lives agile values and principles and follows the processes and practices that the team agreed they would use. The responsibilities of this role include: Clearing obstacles. Establishing an environment where the team can be effective.

Explanation:

8 0
4 years ago
Filmmakers must often establish information quickly in a film in order to give the audience context for the plot. In this film,
Dimas [21]
One thing evident about the two individuals is that Don and Lina are famous. The filmmaker, in the beginning uses the announcer to introduce them as "known all over the world." Another thing to note is that Don and Lina personified themselves a certain way to their fans. The announcer believed sincerely that they were courting. While the announcer played a huge part in giving the audience information that Don and Lina were courting, the filmmaker made sure that audience (crowd in the scene) played a vital part too. Once Don and Lina posed for a picture together, the crowd went wild. This implies that the audience believed that they were together.
8 0
3 years ago
consider the following code segment, which appears in a method in a class other than password. the code segment does not compile
Romashka [77]

The code segment does not compile because the method 'reset' does not return a value that can be displayed.

A method refers to a block of that which only runs when it is called. It is permissible to pass data, referred to as parameters, into a method. Methods are used to accomplish certain actions, and they are also called functions. As per the given code segment that appears as a method in a class, it does not compile because the method named 'reset' is not returning a value that can be printed on the screen as an output.

"

<em>Complete question:</em>

Consider the following code segment, which appears in a method in a class other than password.

Password p = new Password("password");

System.out.println("The new password is " + p.reset("password"));

The code segment does not compile because _____________ .

"

You can learn more about Method at

brainly.com/question/27415982

#SPJ4

4 0
1 year ago
What settings does the available dual-occupant memory system retain in 2023 ariya?.
Mice21 [21]
They’ve ithvs r to give the 4 point of negative hedgehog and bfhhehd hour
6 0
2 years ago
A Website that was once quite popular with younger visitors has lost some of its allure and traffic. How can you develop an audi
Alex787 [66]

Answer:

d. add animations to the site.

7 0
3 years ago
Other questions:
  • Which constraints is applied to a group of fillets that are created by specifying the same radius?
    6·2 answers
  • Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
    10·1 answer
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • Universal Containers wants line items to be organized into pre-defined groups on the output document. The name of these pre-defi
    6·1 answer
  • What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
    6·1 answer
  • Are principles which allow designers to create blank designs
    15·1 answer
  • Which professional can film projects hire as part of their budgeted costs? You can hire special ____ lawyers and include their f
    14·1 answer
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
  • Find the ratio of 24 to 36​
    5·2 answers
  • Q1. Information systems that monitor the elementary activities and transactions of the organizations are: I a. Management-level
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!